Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
10/10/2023, 19:06
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://track.tychon.bid
Resource
win10v2004-20230915-en
General
-
Target
http://track.tychon.bid
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2704 msedge.exe 2704 msedge.exe 1636 msedge.exe 1636 msedge.exe 3592 identity_helper.exe 3592 identity_helper.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1636 wrote to memory of 1684 1636 msedge.exe 32 PID 1636 wrote to memory of 1684 1636 msedge.exe 32 PID 1636 wrote to memory of 4924 1636 msedge.exe 86 PID 1636 wrote to memory of 4924 1636 msedge.exe 86 PID 1636 wrote to memory of 4924 1636 msedge.exe 86 PID 1636 wrote to memory of 4924 1636 msedge.exe 86 PID 1636 wrote to memory of 4924 1636 msedge.exe 86 PID 1636 wrote to memory of 4924 1636 msedge.exe 86 PID 1636 wrote to memory of 4924 1636 msedge.exe 86 PID 1636 wrote to memory of 4924 1636 msedge.exe 86 PID 1636 wrote to memory of 4924 1636 msedge.exe 86 PID 1636 wrote to memory of 4924 1636 msedge.exe 86 PID 1636 wrote to memory of 4924 1636 msedge.exe 86 PID 1636 wrote to memory of 4924 1636 msedge.exe 86 PID 1636 wrote to memory of 4924 1636 msedge.exe 86 PID 1636 wrote to memory of 4924 1636 msedge.exe 86 PID 1636 wrote to memory of 4924 1636 msedge.exe 86 PID 1636 wrote to memory of 4924 1636 msedge.exe 86 PID 1636 wrote to memory of 4924 1636 msedge.exe 86 PID 1636 wrote to memory of 4924 1636 msedge.exe 86 PID 1636 wrote to memory of 4924 1636 msedge.exe 86 PID 1636 wrote to memory of 4924 1636 msedge.exe 86 PID 1636 wrote to memory of 4924 1636 msedge.exe 86 PID 1636 wrote to memory of 4924 1636 msedge.exe 86 PID 1636 wrote to memory of 4924 1636 msedge.exe 86 PID 1636 wrote to memory of 4924 1636 msedge.exe 86 PID 1636 wrote to memory of 4924 1636 msedge.exe 86 PID 1636 wrote to memory of 4924 1636 msedge.exe 86 PID 1636 wrote to memory of 4924 1636 msedge.exe 86 PID 1636 wrote to memory of 4924 1636 msedge.exe 86 PID 1636 wrote to memory of 4924 1636 msedge.exe 86 PID 1636 wrote to memory of 4924 1636 msedge.exe 86 PID 1636 wrote to memory of 4924 1636 msedge.exe 86 PID 1636 wrote to memory of 4924 1636 msedge.exe 86 PID 1636 wrote to memory of 4924 1636 msedge.exe 86 PID 1636 wrote to memory of 4924 1636 msedge.exe 86 PID 1636 wrote to memory of 4924 1636 msedge.exe 86 PID 1636 wrote to memory of 4924 1636 msedge.exe 86 PID 1636 wrote to memory of 4924 1636 msedge.exe 86 PID 1636 wrote to memory of 4924 1636 msedge.exe 86 PID 1636 wrote to memory of 4924 1636 msedge.exe 86 PID 1636 wrote to memory of 4924 1636 msedge.exe 86 PID 1636 wrote to memory of 2704 1636 msedge.exe 87 PID 1636 wrote to memory of 2704 1636 msedge.exe 87 PID 1636 wrote to memory of 1136 1636 msedge.exe 88 PID 1636 wrote to memory of 1136 1636 msedge.exe 88 PID 1636 wrote to memory of 1136 1636 msedge.exe 88 PID 1636 wrote to memory of 1136 1636 msedge.exe 88 PID 1636 wrote to memory of 1136 1636 msedge.exe 88 PID 1636 wrote to memory of 1136 1636 msedge.exe 88 PID 1636 wrote to memory of 1136 1636 msedge.exe 88 PID 1636 wrote to memory of 1136 1636 msedge.exe 88 PID 1636 wrote to memory of 1136 1636 msedge.exe 88 PID 1636 wrote to memory of 1136 1636 msedge.exe 88 PID 1636 wrote to memory of 1136 1636 msedge.exe 88 PID 1636 wrote to memory of 1136 1636 msedge.exe 88 PID 1636 wrote to memory of 1136 1636 msedge.exe 88 PID 1636 wrote to memory of 1136 1636 msedge.exe 88 PID 1636 wrote to memory of 1136 1636 msedge.exe 88 PID 1636 wrote to memory of 1136 1636 msedge.exe 88 PID 1636 wrote to memory of 1136 1636 msedge.exe 88 PID 1636 wrote to memory of 1136 1636 msedge.exe 88 PID 1636 wrote to memory of 1136 1636 msedge.exe 88 PID 1636 wrote to memory of 1136 1636 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://track.tychon.bid1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd21e846f8,0x7ffd21e84708,0x7ffd21e847182⤵PID:1684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,15563719579556209278,14515025974618993708,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,15563719579556209278,14515025974618993708,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,15563719579556209278,14515025974618993708,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2872 /prefetch:82⤵PID:1136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15563719579556209278,14515025974618993708,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15563719579556209278,14515025974618993708,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15563719579556209278,14515025974618993708,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4668 /prefetch:12⤵PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,15563719579556209278,14515025974618993708,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 /prefetch:82⤵PID:3916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,15563719579556209278,14515025974618993708,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15563719579556209278,14515025974618993708,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4900 /prefetch:12⤵PID:3256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15563719579556209278,14515025974618993708,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4920 /prefetch:12⤵PID:1860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15563719579556209278,14515025974618993708,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4780 /prefetch:12⤵PID:64
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15563719579556209278,14515025974618993708,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:12⤵PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,15563719579556209278,14515025974618993708,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2024 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2012
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2840
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:460
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51222f8c867acd00b1fc43a44dacce158
SHA1586ba251caf62b5012a03db9ba3a70890fc5af01
SHA2561e451cb9ffe74fbd34091a1b8d0ab2158497c19047b3416d89e55f498aae264a
SHA512ef3f2fc1cedfc28fb530c710219b8e9eb833a2f344b91d3ffb2d82d7bbedbc223f4b60a38bea35b72eb706e4880ffcbb9256a9768f39bae95c5544be0f503916
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5935476a7a8642ac828c1368f1ebbf3e4
SHA169ba79021690f26d7ef954524cdbcd0cfdcb66e6
SHA256beae5826443608e74a045b4caf26cf851d6127de478c4aa1213ecdc7e06c5359
SHA512da8b508cfee3726e03214bba4a2d71a4ba101a8b2f907e66c914c00d6599a255ca2d6214eca7769c20b930823ea49da34f758bb2d559865cfa336e40e215cd27
-
Filesize
5KB
MD596577434d9ee3580a13fd74ce0a07abf
SHA19183822e72feba717d5d44540658e8791822391a
SHA256f63e290880c9182f43175439d24123796674e926dc3f3668f12fdf1fea9fcf4c
SHA512136366125bae9625049220ff9f12e197aaf810f95186b7b889add97e829c6f1b5d65727e7c14ce4380ce14951f3610791301a3b1072faec281a9059486c21289
-
Filesize
6KB
MD56d3f8a392c3f9d398467b26d42807d74
SHA12bf51736045a7bebde42073c1c04cb5824710c1a
SHA256cb49ada607201dcaf7d3f118df25a091793154b113e6a275732446e4060031fa
SHA5121670d9ac1f6f4c284b96dd75166332e4a5bfeb6cfc3f8233345a786530aaa9d0807be918af07bf51c0f44d95215f6d148b8202e85281c66d0ccc01ecb5b3cdf9
-
Filesize
24KB
MD515ad31a14e9a92d2937174141e80c28d
SHA1b09e8d44c07123754008ba2f9ff4b8d4e332d4e5
SHA256bf983e704839ef295b4c957f1adeee146aaf58f2dbf5b1e2d4b709cec65eccde
SHA512ec744a79ccbfca52357d4f0212e7afd26bc93efd566dd5d861bf0671069ba5cb7e84069e0ea091c73dee57e9de9bb412fb68852281ae9bd84c11a871f5362296
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD500398f958a3f0b6220c0b23301682b1f
SHA19ac82fb723b927f522dcda6c6e1c01e957748458
SHA256540c51f110491a66119ec90f86aff5bf03eec08fb56f7ffaac13593669dd34fd
SHA51202bfdc2b81d6b8caf2b78088efd9945ffe0b00d3f036474f4142b41c03d4a141ae0eb778ca834ca40752d3ee453d8fa2b2dc579419a3cad9469ac2a67fb3a5bd
-
Filesize
10KB
MD57aebb753019df26cb79c8864492d1e66
SHA1df23c7289934d68149e9994ef975485f7747646e
SHA2568b0c85f642ebb96220f7fbea76be02c341ff1b97c3f981c85c3addeb304a5387
SHA512200be2fd1225e15d07b324c2ed6335cda360162d560ea8cb33eeb45e15a85aad4f82ee8cd02eb15aea7e15b7556b39ed4f578e05884b68013045fc267006f3d0